ºÝºÝߣshows by User: mangi95 / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: mangi95 / Tue, 11 Oct 2016 04:17:23 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: mangi95 Spyware presentation by mangesh wadibhasme /slideshow/spyware-presentation-by-mangesh-wadibhasme/66988925 spywarepresentationbymangeshwadibhasmefullfinal-161011041723
 What is SPYWARE?  Spyware is a type of malware that's hard to detect.  It collects information about your surfing habits, browsing history, or personal information (such as credit card numbers), and often uses the internet to pass this information along to third parties without you knowing. o Key loggers are a type of spyware that monitors your key strokes.  Spyware is mostly classified into four types:  1.System monitors  2.Trojans  3.Adware  4.Tracking Cookies spyware is mostly used for the purposes of tracking and storing internet users' movements on the web and serving up pop-up ads to internet users.  History and development of spyware.  The first recorded on October 16, 1995 in a UseNet post that poked fun at microsoft's business model.  Spyware at first denoted software meant for espionage purposes.  However, in early 2000 the founder of zone labs, gregor freund, used the term in a press release for the zone alarm personal firewall.  Use of exploits in JavaScript, internet explorer and windows to install.  Effect and behavior.  Unwanted behavior and degradation of system performance.  Unwanted CPU activity, disk usage, and network traffic.  Stability issues:-  Application's freezing.  Failure to boot.  System-wide crashes.  Difficulty connecting to the internet.  Disable software firewalls and anti-virus software.  Routes of infection.  Installed when you open an email attachment.  Spyware installs itself  Install by using deceptive tactics  Common tactics are using a Trojan horse.  USB Keylogger.  browser forces the download and installation of spyware.  Security Practices. • Installing anti-spyware programs. • Network firewalls and web proxies to block access to web sites known to install spyware • Individual users can also install firewalls. • Install a large hosts file. • It Install shareware programs offered for download. • Downloading programs only from reputable sources can provide some protection from this source of attack  Anti-spyware Programs • Products dedicated to remove or block spyware. • Programs such as pc tool’s spyware doctor, lava soft's ad-aware se and patrick kolla's spybot - search & destroy.  Legal Issues.  Criminal law  US FTC actions  Netherlands OPTA  Civil law  Libel suits by spyware developers  Webcam Gate Thank You! Stay Connected Stay connected with me at Facebook :- https://www.facebook.com/mangesh.wadibhasme Follow at Instagram: - @mangesh_hkr ]]>

 What is SPYWARE?  Spyware is a type of malware that's hard to detect.  It collects information about your surfing habits, browsing history, or personal information (such as credit card numbers), and often uses the internet to pass this information along to third parties without you knowing. o Key loggers are a type of spyware that monitors your key strokes.  Spyware is mostly classified into four types:  1.System monitors  2.Trojans  3.Adware  4.Tracking Cookies spyware is mostly used for the purposes of tracking and storing internet users' movements on the web and serving up pop-up ads to internet users.  History and development of spyware.  The first recorded on October 16, 1995 in a UseNet post that poked fun at microsoft's business model.  Spyware at first denoted software meant for espionage purposes.  However, in early 2000 the founder of zone labs, gregor freund, used the term in a press release for the zone alarm personal firewall.  Use of exploits in JavaScript, internet explorer and windows to install.  Effect and behavior.  Unwanted behavior and degradation of system performance.  Unwanted CPU activity, disk usage, and network traffic.  Stability issues:-  Application's freezing.  Failure to boot.  System-wide crashes.  Difficulty connecting to the internet.  Disable software firewalls and anti-virus software.  Routes of infection.  Installed when you open an email attachment.  Spyware installs itself  Install by using deceptive tactics  Common tactics are using a Trojan horse.  USB Keylogger.  browser forces the download and installation of spyware.  Security Practices. • Installing anti-spyware programs. • Network firewalls and web proxies to block access to web sites known to install spyware • Individual users can also install firewalls. • Install a large hosts file. • It Install shareware programs offered for download. • Downloading programs only from reputable sources can provide some protection from this source of attack  Anti-spyware Programs • Products dedicated to remove or block spyware. • Programs such as pc tool’s spyware doctor, lava soft's ad-aware se and patrick kolla's spybot - search & destroy.  Legal Issues.  Criminal law  US FTC actions  Netherlands OPTA  Civil law  Libel suits by spyware developers  Webcam Gate Thank You! Stay Connected Stay connected with me at Facebook :- https://www.facebook.com/mangesh.wadibhasme Follow at Instagram: - @mangesh_hkr ]]>
Tue, 11 Oct 2016 04:17:23 GMT /slideshow/spyware-presentation-by-mangesh-wadibhasme/66988925 mangi95@slideshare.net(mangi95) Spyware presentation by mangesh wadibhasme mangi95  What is SPYWARE?  Spyware is a type of malware that's hard to detect.  It collects information about your surfing habits, browsing history, or personal information (such as credit card numbers), and often uses the internet to pass this information along to third parties without you knowing. o Key loggers are a type of spyware that monitors your key strokes.  Spyware is mostly classified into four types:  1.System monitors  2.Trojans  3.Adware  4.Tracking Cookies spyware is mostly used for the purposes of tracking and storing internet users' movements on the web and serving up pop-up ads to internet users.  History and development of spyware.  The first recorded on October 16, 1995 in a UseNet post that poked fun at microsoft's business model.  Spyware at first denoted software meant for espionage purposes.  However, in early 2000 the founder of zone labs, gregor freund, used the term in a press release for the zone alarm personal firewall.  Use of exploits in JavaScript, internet explorer and windows to install.  Effect and behavior.  Unwanted behavior and degradation of system performance.  Unwanted CPU activity, disk usage, and network traffic.  Stability issues:-  Application's freezing.  Failure to boot.  System-wide crashes.  Difficulty connecting to the internet.  Disable software firewalls and anti-virus software.  Routes of infection.  Installed when you open an email attachment.  Spyware installs itself  Install by using deceptive tactics  Common tactics are using a Trojan horse.  USB Keylogger.  browser forces the download and installation of spyware.  Security Practices. • Installing anti-spyware programs. • Network firewalls and web proxies to block access to web sites known to install spyware • Individual users can also install firewalls. • Install a large hosts file. • It Install shareware programs offered for download. • Downloading programs only from reputable sources can provide some protection from this source of attack  Anti-spyware Programs • Products dedicated to remove or block spyware. • Programs such as pc tool’s spyware doctor, lava soft's ad-aware se and patrick kolla's spybot - search & destroy.  Legal Issues.  Criminal law  US FTC actions  Netherlands OPTA  Civil law  Libel suits by spyware developers  Webcam Gate Thank You! Stay Connected Stay connected with me at Facebook :- https://www.facebook.com/mangesh.wadibhasme Follow at Instagram: - @mangesh_hkr <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/spywarepresentationbymangeshwadibhasmefullfinal-161011041723-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>  What is SPYWARE?  Spyware is a type of malware that&#39;s hard to detect.  It collects information about your surfing habits, browsing history, or personal information (such as credit card numbers), and often uses the internet to pass this information along to third parties without you knowing. o Key loggers are a type of spyware that monitors your key strokes.  Spyware is mostly classified into four types:  1.System monitors  2.Trojans  3.Adware  4.Tracking Cookies spyware is mostly used for the purposes of tracking and storing internet users&#39; movements on the web and serving up pop-up ads to internet users.  History and development of spyware.  The first recorded on October 16, 1995 in a UseNet post that poked fun at microsoft&#39;s business model.  Spyware at first denoted software meant for espionage purposes.  However, in early 2000 the founder of zone labs, gregor freund, used the term in a press release for the zone alarm personal firewall.  Use of exploits in JavaScript, internet explorer and windows to install.  Effect and behavior.  Unwanted behavior and degradation of system performance.  Unwanted CPU activity, disk usage, and network traffic.  Stability issues:-  Application&#39;s freezing.  Failure to boot.  System-wide crashes.  Difficulty connecting to the internet.  Disable software firewalls and anti-virus software.  Routes of infection.  Installed when you open an email attachment.  Spyware installs itself  Install by using deceptive tactics  Common tactics are using a Trojan horse.  USB Keylogger.  browser forces the download and installation of spyware.  Security Practices. • Installing anti-spyware programs. • Network firewalls and web proxies to block access to web sites known to install spyware • Individual users can also install firewalls. • Install a large hosts file. • It Install shareware programs offered for download. • Downloading programs only from reputable sources can provide some protection from this source of attack  Anti-spyware Programs • Products dedicated to remove or block spyware. • Programs such as pc tool’s spyware doctor, lava soft&#39;s ad-aware se and patrick kolla&#39;s spybot - search &amp; destroy.  Legal Issues.  Criminal law  US FTC actions  Netherlands OPTA  Civil law  Libel suits by spyware developers  Webcam Gate Thank You! Stay Connected Stay connected with me at Facebook :- https://www.facebook.com/mangesh.wadibhasme Follow at Instagram: - @mangesh_hkr
Spyware presentation by mangesh wadibhasme from Mangesh wadibhasme
]]>
1489 3 https://cdn.slidesharecdn.com/ss_thumbnails/spywarepresentationbymangeshwadibhasmefullfinal-161011041723-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-mangi95-48x48.jpg?cb=1576065265